☆31Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerabilities
Users that are interested in Vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- some ida script☆34Aug 18, 2021Updated 4 years ago
- ☆17Jan 11, 2023Updated 3 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- ☆16Dec 15, 2023Updated 2 years ago
- pwn envs based on docker of ubuntu16.04,18.04,20.04☆10Dec 4, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13May 18, 2018Updated 7 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- IDA Pro processor module for Altera Nios II Classic/Gen2 microprocessor architecture☆32Sep 26, 2023Updated 2 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago
- ☆17Feb 3, 2023Updated 3 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 6 years ago
- firmware evaluation reference corpus☆23Dec 5, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Updated this week
- ☆26Aug 16, 2023Updated 2 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- awesome iot exploit resource☆72Jul 15, 2024Updated last year
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Jun 20, 2017Updated 8 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆344Dec 12, 2024Updated last year
- A firmware base address search tool.☆375Sep 27, 2020Updated 5 years ago
- a demo poc for CVE-2024-0015☆18Aug 14, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 25, 2026Updated last month
- 2023 年西湖论剑IoT-AWD赛题仓库☆20Apr 13, 2023Updated 2 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- Script to setup pwn environment with Docker☆50Jan 10, 2026Updated 3 months ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆37Feb 6, 2020Updated 6 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆96Jun 29, 2022Updated 3 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆39Apr 24, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- Modified luadec version to decompile TP-Link Archer C7 LUA firmware.☆31Mar 3, 2020Updated 6 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- Unicorn CPU emulator framework tutorial☆22Apr 5, 2021Updated 5 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆19Jun 2, 2022Updated 3 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆13Jul 26, 2021Updated 4 years ago